Virusscan Enterprise 7.1.0 Installation Guide
Total Page:16
File Type:pdf, Size:1020Kb
Installation Guide Revision 1.0 VirusScan® Enterprise version 7.1.0 COPYRIGHT © 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. To obtain this permission, write to the attention of the Network Associates legal department at: 5000 Headquarters Drive, Plano, Texas 75024, or call +1-972-963-8000. TRADEMARK ATTRIBUTIONS Active Firewall, Active Security, Active Security (in Katakana), ActiveHelp, ActiveShield, AntiVirus Anyware and design, Appera, AVERT, Bomb Shelter, Certified Network Expert, Clean-Up, CleanUp Wizard, ClickNet, CNX, CNX Certification Certified Network Expert and design, Covert, Design (stylized N), Disk Minder, Distributed Sniffer System, Distributed Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, E and Design, Entercept, Enterprise SecureCast, Enterprise SecureCast (in Katakana), ePolicy Orchestrator, Event Orchestrator (in Katakana), EZ SetUp, First Aid, ForceField, GMT, GroupShield, GroupShield (in Katakana), Guard Dog, HelpDesk, HelpDesk IQ, HomeGuard, Hunter, Impermia, InfiniStream, Intrusion Prevention Through Innovation, IntruShield, IntruVert Networks, LANGuru, LANGuru (in Katakana), M and design, Magic Solutions, Magic Solutions (in Katakana), Magic University, MagicSpy, MagicTree, McAfee, McAfee (in Katakana), McAfee and design, McAfee.com, MultiMedia Cloaking, NA Network Associates, Net Tools, Net Tools (in Katakana), NetAsyst, NetCrypto, NetOctopus, NetScan, NetShield, NetStalker, Network Associates, Network Performance Orchestrator, Network Policy Orchestrator, NetXray, NotesGuard, nPO, Nuts & Bolts, Oil Change, PC Medic, PCNotary, PortalShield, Powered by SpamAssassin, PrimeSupport, Recoverkey, Recoverkey – International, Registry Wizard, Remote Desktop, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, SecureSelect, Service Level Manager, ServiceMagic, SmartDesk, Sniffer, Sniffer (in Hangul), SpamKiller, SpamAssassin, Stalker, SupportMagic, ThreatScan, TIS, TMEG, Total Network Security, Total Network Visibility, Total Network Visibility (in Katakana), Total Service Desk, Total Virus Defense, Trusted Mail, UnInstaller, VIDS, Virex, Virus Forum, ViruScan, VirusScan, WebScan, WebShield, WebShield (in Katakana), WebSniffer, WebStalker, WebWall, What's The State Of Your IDS?, Who’s Watching Your Network, WinGauge, Your E-Business Defender, ZAC 2000, Zip Manager are registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. Sniffer® brand products are made only by Network Associates, Inc. All other registered and unregistered trademarks in this document are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO NETWORK ASSOCIATES OR THE PLACE OF PURCHASE FOR A FULL REFUND. Attributions This product includes or may include: Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). Cryptographic software written by Eric A. Young ([email protected]) and software written by Tim J. Hudson ([email protected]). Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that Network Associates provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. All rights reserved. Software written by Douglas W. Sauder. Software developed by the Apache Software Foundation (http://www.apache.org/). International Components for Unicode (“ICU”) Copyright © 1995-2002 International Business Machines Corporation and others. All rights reserved. Software developed by CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc. FEAD® Optimizer® technology, Copyright Netopsystems AG, Berlin, Germany. Issued SEPTEMBER 2003 / VirusScan® Enterprise software version 7.1.0 DOCUMENT BUILD 005-EN Contents Preface . 5 Audience . 5 Conventions . 6 Getting information . 7 Contacting McAfee Security & Network Associates . 8 1 Installing the Software . 9 Before you begin . 10 Pre-installation procedures . 10 System requirements . 11 Server requirements . 11 Workstation requirements . 12 Deployment, updating, and management options . 13 Pre-configuring the installation package . 13 Using McAfee AutoUpdate Architect and McAfee Installation Designer . 14 Using ePolicy Orchestrator . 14 Installation and configuration for use with other products . 15 Netopsystems’ FEAD® Optimizer® . 16 Windows Terminal Server . 16 EMC Celerra™ server . 16 Check Point™ . 16 Product license . 17 Installing VirusScan Enterprise . 18 Using the Setup utility . 19 Starting the installation process . 23 Typical installation . 24 Custom installation . 26 Using the command line . 33 Installing silently . 34 Installing to a custom directory . 36 Selecting specific features to install . 36 Customizing installation properties . 38 Installation Guide iii Contents Setting restart options . 40 Removing incompatible software . 40 Preserving settings . 41 Running Setup from a login script . 41 Installed files . 41 VirusScan folder . 42 Res09 folder . 43 Engine folder . 43 Testing your installation . 44 Modifying VirusScan Enterprise . 45 Starting the Setup utility . 45 Modifying program features . 47 Reinstalling or repairing program files . 49 2 Removing the Software . 53 Using the Setup utility . 54 Using the command line . 57 Using the Add/Remove Programs utility . 57 A Configuring Netopsystems’ FEAD Optimizer . 59 Command-line properties and switches . 59 Optimized file defaults . 60 B Configuring Check Point . 61 Client computer installation . 62 Administrator configuration . 63 Index . 65 iv VirusScan® Enterprise software version 7.1.0 Preface This guide introduces McAfee® VirusScan® Enterprise software version 7.1.0, and provides the following information: Detailed instructions for installing the software. Procedures for modifying the software. Procedures for removing the software. Information on configuring Netopsystems’ FEAD® Optimizer®. Information on configuring Check Point™. Audience This information is intended primarily for two audiences: Network administrators who are responsible for their company’s anti-virus and security program. Users who are responsible for updating virus definition (DAT) files on their workstation, or configuring the software’s detection options. Installation Guide 5 Preface Conventions This guide uses the following conventions: Bold All words from the user interface, including options, menus, buttons, and dialog box names. Example Type the User name and Password of the desired account. Courier Text that represents something the user types exactly; for example, a command at the system prompt. Example To enable the agent, run this command line on the client computer: FRMINST.EXE /INSTALL=AGENT /SITEINFO=C:\TEMP\SITELIST.XML Italic For emphasis or when introducing a new term; for names of product manuals and topics (headings) within the manuals. Example Refer to the VirusScan Enterprise Product Guide for more information. <TERM> Angle brackets enclose a generic term. Example In the console tree under ePolicy Orchestrator, right-click <SERVER>. NOTE Supplemental information; for example, an alternate method of executing the same command. WARNING Important advice to protect a user, computer.